How to Identify Social Engineering Attacks

person wearing scream mask and black dress shirt while facing computer table during daytime

There are so many ways to identify a social engineering attack to evade an attacker, below are a few and most prominent ways.

  • An Email, Text or Phone call asking for immediate assistance
  • An Email, Text or Phone call asking you to donate to a charitable cause.
  • An Email, Text or Phone call asking you to “verify” your information
  • An Email, Text or Phone call responding to a question you didn’t ask

Asking for immediate assistance

Attackers will use language that instills a sense of urgency and emotional tactics on their victims to try to pressure the victim to rush into action without thinking about it. If someone asks you to make an urgent to your BVN number or bank details via a link sent to your mail, you should slow down and ensure that the transaction you’ll be conducting is legitimate.

Asking to donate to a charitable cause

Social engineers will exploit our generosity with phony requests for donations to charitable causes which includes payment instructions on how to send money to the hacker.

By researching you on social media, a social engineer can figure out what charitable causes, disaster relief efforts, or political campaigns that you are likely to support. They will use this information to craft messages aligned with your ideals.

Asking to verify your information

Another approach social engineers will take is presenting a problem that can only be resolved by you verifying your information. Included in their message will be a link that brings you to a form to provide your information.

These messages and forms can look legitimate with the right logos and branding, which can lull you into believing the sender and the message are legitimate.

An example will be getting a mail from an attacker asking you to update or verify you banking information. This is mostly done through Phishing & Vishing.

Responding to a question you didn’t ask

Social engineers will pose as s customer service agent from your  bank and send you a message “responding” to a request for help. Though you never sent a request for help, you might decide that since you already have a rep contacting you, this would be an opportune time to receive support for an issue you’ve been experiencing.

Inevitably the attacker will request specific information from you to “authenticate your identity.” In reality, they’re just stealing your information.

Stay Safe Online

3 Responses

Leave a Reply

Your email address will not be published. Required fields are marked *

Share

Related Posts

Subscribe to Cyberverdict to Get Newest Update

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.